{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:27Z","timestamp":1750220727589,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T00:00:00Z","timestamp":1589500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,15]]},"DOI":"10.1145\/3404663.3404678","type":"proceedings-article","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T22:10:11Z","timestamp":1594419011000},"page":"14-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of appropriate standards to solve cybersecurity problems in public organizations"],"prefix":"10.1145","author":[{"given":"Segundo Mois\u00e9s T.","family":"Toapanta","sequence":"first","affiliation":[{"name":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"}]},{"given":"Gustavo Salomon Gaibor","family":"E.","sequence":"additional","affiliation":[{"name":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"}]},{"given":"Luis Enrique Mafla","family":"Gallegos","sequence":"additional","affiliation":[{"name":"National Polytechnic School, Quito, Ecuador"}]}],"member":"320","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ciberseguridad en Am\u00e9rica Latina y ciberdefensa en Chile. Revista Chilena de Derecho y Tecnologia, 7(1), 1--2. DOI= https:\/\/doi.org\/10.5354\/0719-2584.2018.50416","author":"Valenzuela D.","year":"2018","unstructured":"Valenzuela , D. \u00c1. ( 2018 ). Ciberseguridad en Am\u00e9rica Latina y ciberdefensa en Chile. Revista Chilena de Derecho y Tecnologia, 7(1), 1--2. DOI= https:\/\/doi.org\/10.5354\/0719-2584.2018.50416 10.5354\/0719-2584.2018.50416 Valenzuela, D. \u00c1. (2018). Ciberseguridad en Am\u00e9rica Latina y ciberdefensa en Chile. Revista Chilena de Derecho y Tecnologia, 7(1), 1--2. DOI= https:\/\/doi.org\/10.5354\/0719-2584.2018.50416"},{"key":"e_1_3_2_1_2_1","volume-title":"Agenda legislativa sobre ciberseguridad en Chile. Revista Chilena de Derecho y Tecnologia, 7(2), 1--3. https:\/\/doi.org\/10.5354\/0719-2584.2018.51992","author":"Valenzuela D.","year":"2018","unstructured":"Valenzuela , D. \u00c1. ( 2018 ). Agenda legislativa sobre ciberseguridad en Chile. Revista Chilena de Derecho y Tecnologia, 7(2), 1--3. https:\/\/doi.org\/10.5354\/0719-2584.2018.51992 10.5354\/0719-2584.2018.51992 Valenzuela, D. \u00c1. (2018). Agenda legislativa sobre ciberseguridad en Chile. Revista Chilena de Derecho y Tecnologia, 7(2), 1--3. https:\/\/doi.org\/10.5354\/0719-2584.2018.51992"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3349266.3351407"},{"key":"e_1_3_2_1_4_1","volume-title":"\u00abRanking Esquema Gubernamental de Seguridad de la Informaci\u00f3n -- EGSI\u00bb, 02","author":"Ministerio","year":"2020","unstructured":"Ministerio de telecomunicaciones y de la sociedad de la informaci\u00f2n , \u00abRanking Esquema Gubernamental de Seguridad de la Informaci\u00f3n -- EGSI\u00bb, 02 2020 . [En l\u00ednea]. Available : Ranking Esquema Gubernamental de Seguridad de la Informaci\u00f3n -- EGSI. [\u00daltimo acceso: 2019]. Ministerio de telecomunicaciones y de la sociedad de la informaci\u00f2n, \u00abRanking Esquema Gubernamental de Seguridad de la Informaci\u00f3n -- EGSI\u00bb, 02 2020. [En l\u00ednea]. Available: Ranking Esquema Gubernamental de Seguridad de la Informaci\u00f3n -- EGSI. [\u00daltimo acceso: 2019]."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1590\/2318-08892018000100005"},{"key":"e_1_3_2_1_6_1","volume-title":"An Approach of National and International Cybersecurity Laws and Standards to Mitigate Information Risks in Public Organizations of Ecuador. Fault Detection, https:\/\/doi.org\/10.1145\/3375900.3375909","author":"Toapanta S.","year":"2019","unstructured":"Toapanta , S. , & Jimenez , A. , Gallegos , L. ( 2019 ). An Approach of National and International Cybersecurity Laws and Standards to Mitigate Information Risks in Public Organizations of Ecuador. Fault Detection, https:\/\/doi.org\/10.1145\/3375900.3375909 10.1145\/3375900.3375909 Toapanta, S., & Jimenez, A., Gallegos, L. (2019). An Approach of National and International Cybersecurity Laws and Standards to Mitigate Information Risks in Public Organizations of Ecuador. Fault Detection, https:\/\/doi.org\/10.1145\/3375900.3375909"},{"key":"e_1_3_2_1_7_1","volume-title":"Design of a Prototype for IT Security Architectures in a Public Organization for Latin America. https:\/\/doi.org\/10.1145\/3375900.3375916","author":"Vaca A. J.","year":"2019","unstructured":"T, S. M. T., Vaca , A. J. , Enrique , L. , & Gallegos , M. ( 2019 ). Design of a Prototype for IT Security Architectures in a Public Organization for Latin America. https:\/\/doi.org\/10.1145\/3375900.3375916 10.1145\/3375900.3375916 T, S. M. T., Vaca, A. J., Enrique, L., & Gallegos, M. (2019). Design of a Prototype for IT Security Architectures in a Public Organization for Latin America. https:\/\/doi.org\/10.1145\/3375900.3375916"},{"key":"e_1_3_2_1_8_1","volume-title":"Iberian Conference on Information Systems and Technologies, CISTI. https:\/\/doi.org\/10","author":"Bayona S.","year":"2017","unstructured":"Bayona , S. , & Ayala , M. ( 2017 ). IT governance: Progress and challenges on public administration [Gobierno TI: Avances y Retos para las Instituciones P\u00fablicas] . Iberian Conference on Information Systems and Technologies, CISTI. https:\/\/doi.org\/10 .23919\/CISTI.2017.7975965. 10.23919\/CISTI.2017.7975965 Bayona, S., & Ayala, M. (2017). IT governance: Progress and challenges on public administration [Gobierno TI: Avances y Retos para las Instituciones P\u00fablicas]. Iberian Conference on Information Systems and Technologies, CISTI. https:\/\/doi.org\/10.23919\/CISTI.2017.7975965."},{"key":"e_1_3_2_1_9_1","volume-title":"Definition of cybersecurity businness framework based on ADM-TOGAF. 1--7. https:\/\/doi.org\/10.1109\/cisti.2015.7170391","author":"Danilo Jaramillo H.","year":"2015","unstructured":"Danilo Jaramillo , H. , Cabrera , S. A. , Abad , E. M. , Torres , V. A. , & Verdum , J. C. ( 2015 ). Definition of cybersecurity businness framework based on ADM-TOGAF. 1--7. https:\/\/doi.org\/10.1109\/cisti.2015.7170391 10.1109\/cisti.2015.7170391 Danilo Jaramillo, H., Cabrera, S. A., Abad, E. M., Torres, V. A., & Verdum, J. C. (2015). Definition of cybersecurity businness framework based on ADM-TOGAF. 1--7. https:\/\/doi.org\/10.1109\/cisti.2015.7170391"},{"key":"#cr-split#-e_1_3_2_1_10_1.1","doi-asserted-by":"crossref","unstructured":"Sabill\u00f3n R. & M. J. J. C. (2019). Auditor\u00edas en Ciberseguridad: Un modelo de aplicaci\u00f3n general para empresas y naciones. RISTI - Revista Ib\u00e9rica de Sistemas e Tecnologias de Informa\u00e7\u00e3o (32) 33--48. https:\/\/doi.org\/10.17013\/risti.32.33-48 10.17013\/risti.32.33-48","DOI":"10.17013\/risti.32.33-48"},{"key":"#cr-split#-e_1_3_2_1_10_1.2","doi-asserted-by":"crossref","unstructured":"Sabill\u00f3n R. & M. J. J. C. (2019). Auditor\u00edas en Ciberseguridad: Un modelo de aplicaci\u00f3n general para empresas y naciones. RISTI - Revista Ib\u00e9rica de Sistemas e Tecnologias de Informa\u00e7\u00e3o (32) 33--48. https:\/\/doi.org\/10.17013\/risti.32.33-48","DOI":"10.17013\/risti.32.33-48"},{"issue":"1","key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Revisi\u00f3n, an\u00e1lisis y evaluaci\u00f3n de sistemas para la gesti\u00f3n de activos multimedia en organizaciones","volume":"41","author":"Casc\u00f3n-Katchadourian J.","year":"2018","unstructured":"Casc\u00f3n-Katchadourian , J. , Ruiz-Rodr\u00edguez , A. \u00c1., & Alberich-Pascual , J. ( 2018 ). Revisi\u00f3n, an\u00e1lisis y evaluaci\u00f3n de sistemas para la gesti\u00f3n de activos multimedia en organizaciones . Revista Espanola de Documentacion Cientifica , 41 ( 1 ), 1 -- 13 . https:\/\/doi.org\/10.3989\/redc.2018.1.1481. 10.3989\/redc.2018.1.1481 Casc\u00f3n-Katchadourian, J., Ruiz-Rodr\u00edguez, A. \u00c1., & Alberich-Pascual, J. (2018). Revisi\u00f3n, an\u00e1lisis y evaluaci\u00f3n de sistemas para la gesti\u00f3n de activos multimedia en organizaciones. Revista Espanola de Documentacion Cientifica, 41(1), 1--13. https:\/\/doi.org\/10.3989\/redc.2018.1.1481.","journal-title":"Revista Espanola de Documentacion Cientifica"},{"key":"e_1_3_2_1_12_1","volume-title":"Iberian Conference on Information Systems and Technologies, CISTI","author":"Rea-Guaman M.","year":"2018","unstructured":"Rea-Guaman , M. , Calvo-Manzano , J. A. , & Feliu , T. S. ( 2018 ). A prototype to manage cybersecurity in small companies | Prototipo para Gestionar la Ciberseguridad en Peque\u00f1as Empresas . Iberian Conference on Information Systems and Technologies, CISTI , 2018-June, 1--6. https:\/\/doi.org\/10.23919\/CISTI.2018.8399252 10.23919\/CISTI.2018.8399252 Rea-Guaman, M., Calvo-Manzano, J. A., & Feliu, T. S. (2018). A prototype to manage cybersecurity in small companies | Prototipo para Gestionar la Ciberseguridad en Peque\u00f1as Empresas. Iberian Conference on Information Systems and Technologies, CISTI, 2018-June, 1--6. https:\/\/doi.org\/10.23919\/CISTI.2018.8399252"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2017915416"},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Transnational Organizations, Accessibility, and the Next Generation","author":"Durrell J.","year":"2019","unstructured":"Durrell , J. ( 2019 ). Transnational Organizations, Accessibility, and the Next Generation . Latin American Perspectives , XX (Xxx), 1 -- 18 . https:\/\/doi.org\/10.1177\/0094582X19879133. 10.1177\/0094582X19879133 Durrell, J. (2019). Transnational Organizations, Accessibility, and the Next Generation. Latin American Perspectives, XX(Xxx), 1--18. https:\/\/doi.org\/10.1177\/0094582X19879133.","journal-title":"Latin American Perspectives"},{"key":"e_1_3_2_1_15_1","volume-title":"Ciberseguridad, la protecci\u00f3n de la informaci\u00f3n en un mundo digital.","author":"Industrial I.","year":"2016","unstructured":"Industrial , I. ( 2016 ). Ciberseguridad, la protecci\u00f3n de la informaci\u00f3n en un mundo digital. Retrieved from https:\/\/upfinder.upf.edu\/iii\/encore\/record\/C__Rb1539055__S (seguretat digital) f:ab:fr__Ff:facetlocations:fr:fr:Poblenou::__Orightresult__U__X1?lang=cat Industrial, I. (2016). Ciberseguridad, la protecci\u00f3n de la informaci\u00f3n en un mundo digital. Retrieved from https:\/\/upfinder.upf.edu\/iii\/encore\/record\/C__Rb1539055__S (seguretat digital) f:ab:fr__Ff:facetlocations:fr:fr:Poblenou::__Orightresult__U__X1?lang=cat"},{"key":"e_1_3_2_1_16_1","unstructured":"Miguel G. Alonso P. & Tejada R. R. (n.d.). Cap\u00edtulo sexto La cooperaci\u00f3n p\u00fablico-privada en el fomento de la cultura de ciberseguridad Gregorio Miguel Pulido Alonso y Rafael Rosell Tejada. 217--246.  Miguel G. Alonso P. & Tejada R. R. (n.d.). Cap\u00edtulo sexto La cooperaci\u00f3n p\u00fablico-privada en el fomento de la cultura de ciberseguridad Gregorio Miguel Pulido Alonso y Rafael Rosell Tejada. 217--246."},{"key":"e_1_3_2_1_17_1","volume-title":"Fundamentos de seguridad en redes: aplicaciones y est\u00e1ndares","author":"Stallings W.","year":"2004","unstructured":"Stallings , W. ( 2004 ). Fundamentos de seguridad en redes: aplicaciones y est\u00e1ndares . Stallings, W. (2004). Fundamentos de seguridad en redes: aplicaciones y est\u00e1ndares."},{"key":"e_1_3_2_1_18_1","volume-title":"Ciberseguridad: Una Estrategia Inform\u00e1tico-Militar","author":"Corletti Estrada A.","year":"2017","unstructured":"Corletti Estrada , A. ( 2017 ). Ciberseguridad: Una Estrategia Inform\u00e1tico-Militar . Corletti Estrada, A. (2017). Ciberseguridad: Una Estrategia Inform\u00e1tico-Militar."}],"event":{"name":"ICISDM 2020: 2020 the 4th International Conference on Information System and Data Mining","acronym":"ICISDM 2020","location":"Hawaii HI USA"},"container-title":["Proceedings of the 2020 the 4th International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404663.3404678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:18Z","timestamp":1750199898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,15]]},"references-count":19,"alternative-id":["10.1145\/3404663.3404678","10.1145\/3404663"],"URL":"https:\/\/doi.org\/10.1145\/3404663.3404678","relation":{},"subject":[],"published":{"date-parts":[[2020,5,15]]},"assertion":[{"value":"2020-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}